Some Software Security Tools - a List

Many people don't realise the potential there is for leaking information on the internet, or the power of software security tools to snatch that information. When we check our bank balance over that free wifi at that Truckstop or dodgy hotel. Or send some payment from a paypal account using the PCs in the reception area of a 5 star hotel, you are at risk.

Let me repeat - you are at Risk. There's no point living in denial, because bad things are happening to millions across the world using the internet. There are scams, spams, assaults and internet muggings happening all the time. The rewards are growing and in many ways the risks decreasing for cybercriminals.

Put's away soap box

However there is no need to get as paranoid as I am, you may have heard of the expression - 'go for the low hanging fruit'. It's an expression valid in many fields but especially in the world of cybercrime. All it basically means is - go for the easy stuff, target the mug, work the sap or more cynically perhaps steal from the clueless. Learn a little and make sure you're not an easy target.

An awareness of what can happen online is a great start to protecting yourself, so dear reader (if I have any) please take some time and look at this list. It's a list of security tools, lots of software security tools. Read the descriptions, find out what they can do, if you want -install and play around with a few of the tools.

When you start using the cookie analysers, password crackers and packet sniffers - you'll slowly learn that everything you do online is not exactly private. When you combine that with the knowledge that the majority of information on the internet is transferred in clear text via HTTP then it does get a little more alarming.

The potential for theft, blackmail and criminal acts online is virtually unlimited.

Anyway here's the list of software security tools - I urge you to take a few minutes and look at a cross section of what's possible. They are of course not written for the online criminal or hacker but the security professional, they are however used by both sides.